blog-banner.jpg

Total Cloud Security Blog

Mike Schuricht

Recent Posts

Glass Class: High-performance Security - The PolyScale Architecture

By Mike Schuricht  |  March 24, 2020 at 5:00 AM  | 

How do cloud security architectural design decisions affect vendors’ ability to provide a performant, scalable, and reliable platform?

Take the example of an offsite meeting.  Thousands of normally geographically dispersed employees converge on a single location for a few days.  Other cloud security solutions built on the appliance model cannot scale to meet the dynamic demand profile. 

Read More

How to Protect Data in a BYOD World

By Mike Schuricht  |  September 26, 2018 at 4:35 AM  | 

Every day, more and more corporate information is moving to employees' personal devices. This rise of BYOD (bring your own device) provides increased flexibility and productivity to employees and, consequently, the organizations for which they work. However, it also creates new cybersecurity concerns. Traditional tools built for corporate-owned, managed devices are not ideal for this new BYOD landscape. Learn more by watching the below Glass Class.

Read More

Want to Secure Salesforce? No Problem!

By Mike Schuricht  |  September 6, 2018 at 5:08 AM  | 

Every day, more and more corporate information is moving to cloud applications like Salesforce. While these cloud-based tools provide organizations with increased flexibility, collaboration, and more, they can also lead to data leakage when not properly insulated from threats. Fortunately, advanced security solutions like cloud access security brokers (CASBs) can protect data in Salesforce through capabilities such as full strength encryption that preserves key functionality (search and sort). Learn more by watching the below Glass Class.

Read More

How to Surf the Tidal Wave of SaaS Apps: A CASB Story

By Mike Schuricht  |  May 7, 2018 at 4:45 AM  | 

More and more cloud apps are arising every day, creating a massive SaaS tidal wave. These apps can offer increased efficiency for their users, expose data to malicious hackers, and be used by employees looking to steal data. Regardless of the motive behind using it, shadow IT causes the enterprise to lose visibility and control over where its data is going and who is accessing it. As such, organizations cannot stand idly by as their data slips through their fingers; rather, they must find a way to ride the ever-growing wave of SaaS apps.

Read More
FOLLOW US